Skip to content

Commit 695ea41

Browse files
committed
update the ssl config for backup
1 parent b1f5421 commit 695ea41

File tree

2 files changed

+31
-4
lines changed

2 files changed

+31
-4
lines changed

modules/ROOT/pages/backup-restore/online-backup.adoc

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -312,12 +312,39 @@ The SSL configuration policy has the key of `dbms.ssl.policy.backup`.
312312

313313
As an example, add the following content to your _neo4j.conf_ and _neo4j-admin.conf_ files:
314314

315+
.Server configuration in _neo4j.conf_
315316
[source, properties]
316317
----
318+
server.backup.listen_address=0.0.0.0:6362
317319
dbms.ssl.policy.backup.enabled=true
318-
dbms.ssl.policy.backup.tls_versions=TLSv1.2
319-
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
320+
dbms.ssl.policy.backup.base_directory=certificates/backup
321+
dbms.ssl.policy.backup.private_key=private.key
322+
dbms.ssl.policy.backup.public_certificate=public.crt
320323
dbms.ssl.policy.backup.client_auth=REQUIRE
324+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
325+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
326+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
327+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
328+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
329+
# dbms.netty.ssl.provider=OPENSSL
330+
dbms.netty.ssl.provider=JDK
331+
----
332+
333+
.Client configuration in _neo4j-admin.conf_
334+
[source, properties]
335+
----
336+
# Enable SSL backup
337+
dbms.ssl.policy.backup.enabled=true
338+
# dbms.ssl.policy.backup.base_directory=certificates/backup
339+
dbms.ssl.policy.backup.private_key=/path/to/certificates/backup/private.key
340+
dbms.ssl.policy.backup.public_certificate=/path/to/certificates/backup/public.crt
341+
dbms.ssl.policy.backup.client_auth=REQUIRE
342+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
343+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
344+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
345+
# dbms.netty.ssl.provider=OPENSSL
346+
dbms.netty.ssl.provider=JDK
347+
server.jvm.additional=-Djavax.net.ssl.trustStore=/path/to/certificates/backup/trusted/
321348
----
322349

323350
[TIP]

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -928,7 +928,7 @@ The owner/group should be configured to the user/group that will be running the
928928
Default user/group is neo4j/neo4j.
929929
====
930930
931-
. Set the backup SSL configuration in _neo4j.conf_.
931+
. Set the backup SSL configuration in both _neo4j.conf_ and _neo4j-admin.conf_.
932932
.. Set the backup SSL policy to `true`:
933933
+
934934
[source, properties]
@@ -1150,7 +1150,7 @@ This means that while new connections will use new certificates, the existing co
11501150
Even if a certificate expires, active connections remain unaffected because the certificates are only used during the initial connection handshake.
11511151
11521152
. Verify that the intra-cluster communication is still encrypted using external tooling, such as Nmap, described in <<ssl-cluster-config, Configuring SSL for intra-cluster communications>>.
1153-
1153+
11541154
11551155
[[ssl-terminology]]
11561156
== Terminology

0 commit comments

Comments
 (0)